메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1120-1131

Non-exposure location anonymity

Author keywords

[No Author keywords available]

Indexed keywords

ACCURATE LOCATION; DISTRIBUTED ALGORITHM; K-ANONYMITY; LOCATION ANONYMITY; MOBILE USERS; SUB-PROBLEMS; USER LOCATION; USER PRIVACY;

EID: 67649671762     PISSN: 10844627     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDE.2009.106     Document Type: Conference Paper
Times cited : (83)

References (25)
  • 1
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking," in Proc. of MobiSys, 2003, pp. 31-42.
    • (2003) Proc. of MobiSys , pp. 31-42
    • Gruteser, M.1    Grunwald, D.2
  • 2
    • 27944454864 scopus 로고    scopus 로고
    • Location privacy in mobile systems: A personalized anonymization model
    • B. Gedik and L. Liu, "Location privacy in mobile systems: A personalized anonymization model," in Proc. of ICDCS, 2005, pp. 620-629.
    • (2005) Proc. of ICDCS , pp. 620-629
    • Gedik, B.1    Liu, L.2
  • 3
    • 34547720006 scopus 로고    scopus 로고
    • The new casper: Query processing for location services without compromising privacy
    • M. F. Mokbel, C.-Y. Chow, and W. G. Aref, "The new casper: Query processing for location services without compromising privacy," in Proc. of VLDB, 2006, pp. 763-774.
    • (2006) Proc. of VLDB , pp. 763-774
    • Mokbel, M.F.1    Chow, C.-Y.2    Aref, W.G.3
  • 5
    • 52649118020 scopus 로고    scopus 로고
    • Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services
    • M. L. Yiu, C. S. Jensen, X. Huang, and H. Lu, "Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services," in Proc. of ICDE, 2008.
    • (2008) Proc. of ICDE
    • Yiu, M.L.1    Jensen, C.S.2    Huang, X.3    Lu, H.4
  • 6
    • 35648982949 scopus 로고    scopus 로고
    • Preventing location-based identity inference in anonymous spatial queries
    • P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preventing location-based identity inference in anonymous spatial queries," TKDE, vol. 19, no. 12, pp. 1719-1733, 2007.
    • (2007) TKDE , vol.19 , Issue.12 , pp. 1719-1733
    • Kalnis, P.1    Ghinita, G.2    Mouratidis, K.3    Papadias, D.4
  • 7
    • 35348924316 scopus 로고    scopus 로고
    • Prive: Anonymous locationbased queries in distributed mobile systems
    • G. Ghinita, P. Kalnis, and S. Skiadopoulos, "Prive: Anonymous locationbased queries in distributed mobile systems," in Proc. of WWW '07, 2007, pp. 371-380.
    • (2007) Proc. of WWW '07 , pp. 371-380
    • Ghinita, G.1    Kalnis, P.2    Skiadopoulos, S.3
  • 8
    • 34547474184 scopus 로고    scopus 로고
    • A peer-to-peer spatial cloaking algorithm for anonymous location-based services
    • C.-Y. Chow, M. F. Mokbel, and X. Liu, "A peer-to-peer spatial cloaking algorithm for anonymous location-based services," in Proc. of ACM GIS, 2006, pp. 171-178.
    • (2006) Proc. of ACM GIS , pp. 171-178
    • Chow, C.-Y.1    Mokbel, M.F.2    Liu, X.3
  • 11
    • 36549043405 scopus 로고    scopus 로고
    • Protecting location privacy with personalized kanonymity: Architecture and algorithms
    • B. Gedik and L. Liu, "Protecting location privacy with personalized kanonymity: Architecture and algorithms," IEEE Transactions on Mobile Computing, vol. 7, no. 1, pp. 1-18, 2008.
    • (2008) IEEE Transactions on Mobile Computing , vol.7 , Issue.1 , pp. 1-18
    • Gedik, B.1    Liu, L.2
  • 13
    • 2342502819 scopus 로고    scopus 로고
    • Preserving privacy in environments with location-based applications
    • G. Myles, A. Friday, and N. Davies, "Preserving privacy in environments with location-based applications," Pervasive Computing, vol. 2, no. 1, pp. 56-64, 2003.
    • (2003) Pervasive Computing , vol.2 , Issue.1 , pp. 56-64
    • Myles, G.1    Friday, A.2    Davies, N.3
  • 14
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • A. Beresford and F. Stajano, "Location privacy in pervasive computing," IEEE Pervasive Computing, vol. 2, no. 1, pp. 46-55, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.1    Stajano, F.2
  • 19
    • 0242332739 scopus 로고    scopus 로고
    • Small worlds in wireless networks
    • A. Helmy, "Small worlds in wireless networks," IEEE Communications Letters, vol. 7, no. 10, pp. 490-492, 2003.
    • (2003) IEEE Communications Letters , vol.7 , Issue.10 , pp. 490-492
    • Helmy, A.1
  • 20
    • 51249183803 scopus 로고
    • The diameter of random regular graphs
    • B. Bollobs and W. F. de la Vega, "The diameter of random regular graphs," Combinatorica, vol. 2, no. 2, pp. 125-134, 1982.
    • (1982) Combinatorica , vol.2 , Issue.2 , pp. 125-134
    • Bollobs, B.1    de la Vega, W.F.2
  • 24
    • 0242697123 scopus 로고    scopus 로고
    • A study of several specific secure two-party computation problems,
    • Ph.D. dissertation
    • W. Du, "A study of several specific secure two-party computation problems," Ph.D. dissertation, 2001.
    • (2001)
    • Du, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.